{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:48:20Z","timestamp":1751456900082},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,1,29]],"date-time":"2015-01-29T00:00:00Z","timestamp":1422489600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s13042-015-0331-z","type":"journal-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T06:20:38Z","timestamp":1422426038000},"page":"379-395","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform"],"prefix":"10.1007","volume":"8","author":[{"given":"Rajesh","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Navin","family":"Rajpal","sequence":"additional","affiliation":[]},{"given":"Virendra P.","family":"Vishwakarma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,29]]},"reference":[{"issue":"6","key":"331_CR1","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"12","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 12(6):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"331_CR2","doi-asserted-by":"crossref","unstructured":"Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Processing Magazine, pp 58\u201364","DOI":"10.1109\/79.879339"},{"issue":"3","key":"331_CR3","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis N, Pitas I (1998) Robust image watermarking in spatial domain. Sig Process 66(3):385\u2013403","journal-title":"Sig Process"},{"key":"331_CR4","doi-asserted-by":"crossref","unstructured":"Hsieh CT, Hsieh MY (2005) A high robust blind watermarking in DCT domain. In: Khosla R et al. (ed) KES 2005, LNAI 3681, pp 1205\u20131211","DOI":"10.1007\/11552413_172"},{"issue":"6","key":"331_CR5","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1007\/BF02831844","volume":"11","author":"SU Liyun","year":"2006","unstructured":"Liyun SU, Hong MA, Shifu T (2006) Adaptive image digital watermarking with DCT and FCM. Wuhan Univer J Nat Sci 11(6):1657\u20131660","journal-title":"Wuhan Univer J Nat Sci"},{"issue":"9","key":"331_CR6","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1016\/j.ins.2009.05.022","volume":"179","author":"T-C Lin","year":"2009","unstructured":"Lin T-C, Lin C-M (2009) Wavelet based copyright-protection scheme for digital images based on local features. Inf Sci 179(9):3349\u20133358","journal-title":"Inf Sci"},{"issue":"9","key":"331_CR7","doi-asserted-by":"crossref","first-page":"11509","DOI":"10.1016\/j.eswa.2009.03.060","volume":"36","author":"WH Lin","year":"2009","unstructured":"Lin WH, Wang YR, Hong SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509\u201311516","journal-title":"Expert Syst Appl"},{"issue":"9","key":"331_CR8","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.1016\/j.sigpro.2011.12.021","volume":"92","author":"B Lei","year":"2012","unstructured":"Lei B, Soon IY, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Sig Process 92(9):1985\u20132001","journal-title":"Sig Process"},{"key":"331_CR9","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/978-3-642-13681-8_46","volume":"6134","author":"K Loukhaoukha","year":"2010","unstructured":"Loukhaoukha K, Chouinard JY, Taieb MH (2010) Multi-Objective genetic algorithm optimization for image watermarking based on singular value decomposition and Lifting wavelet transform. Lect Notes Comput Sci 6134:394\u2013403","journal-title":"Lect Notes Comput Sci"},{"key":"331_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0603-6","author":"VS Verma","year":"2014","unstructured":"Verma VS, Jha RK (2014) Improved watermarking technique based on significant difference of lifting wavelet coefficients. SIViP. doi: 10.1007\/s11760-013-0603-6","journal-title":"SIViP"},{"key":"331_CR11","unstructured":"Li C, Zheng-ding L, Zhou K (2005) An image watermarking technique based on support vector regression. In: Proceedings of IEEE international symposium on communication and information technologies, pp 177\u2013180"},{"issue":"5","key":"331_CR12","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.jvcir.2008.03.002","volume":"19","author":"XY Wang","year":"2008","unstructured":"Wang XY, Cui CY (2008) A novel image watermarking scheme against desynchronization attacks by SVR revision. J Vis Commun Image Represent 19(5):334\u2013342","journal-title":"J Vis Commun Image Represent"},{"key":"331_CR13","doi-asserted-by":"crossref","unstructured":"Meng F, Peng H, Wang J (2008) A novel blind image watermarking scheme based on support vector machine in DCT domain. In: Proceeding IEEE international conference on computational intelligence and security, pp 16\u201320","DOI":"10.1109\/CIS.2008.20"},{"issue":"8","key":"331_CR14","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H Peng","year":"2010","unstructured":"Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83(8):1470\u20131477","journal-title":"J Syst Softw"},{"issue":"4","key":"331_CR15","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/s00500-008-0331-y","volume":"13","author":"XB Wen","year":"2009","unstructured":"Wen XB, Zhang H, Xu XQ, Quan J-J (2009) A new watermarking approach based on probabilistic neural network in wavelet domain. Soft Comput 13(4):355\u2013360","journal-title":"Soft Comput"},{"issue":"7","key":"331_CR16","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal C, Mishra A, Sharma A (2013) Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image Represent 24(7):1135\u20131146","journal-title":"J Vis Commun Image Represent"},{"key":"331_CR17","first-page":"161","volume":"1","author":"OL Mangasarian","year":"2001","unstructured":"Mangasarian OL, Musciant DR (2001) Lagrangian support vector machines. J Mach Learn Res 1:161\u2013177","journal-title":"J Mach Learn Res"},{"key":"331_CR18","first-page":"577","volume":"13","author":"OL Mangasrian","year":"2001","unstructured":"Mangasrian OL, Musciant DR (2001) Active set support vector machines classifications. Adv Neural Inform Process Syst 13:577\u2013586","journal-title":"Adv Neural Inform Process Syst"},{"key":"331_CR19","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.neucom.2011.10.028","volume":"82","author":"G Feng","year":"2012","unstructured":"Feng G, Qian Z, Dai N (2012) Reversible watermarking via extreme learning machine prediction. Neurocomputing 82:62\u201368","journal-title":"Neurocomputing"},{"key":"331_CR20","doi-asserted-by":"crossref","unstructured":"Balasundaram S, Kapil (2010) On Lagrangian support vector regression. Expert Syst Appl 37(12): 8784\u20138792","DOI":"10.1016\/j.eswa.2010.06.028"},{"issue":"1","key":"331_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s00521-012-0971-9","volume":"22","author":"S Balasundaram","year":"2013","unstructured":"Balasundaram S, Tanveer M (2013) On Lagrangian twin support vector regression. Neural Comput Appl 22(1):257\u2013267","journal-title":"Neural Comput Appl"},{"issue":"3","key":"331_CR22","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubeches","year":"1998","unstructured":"Daubeches I, Sweldens W (1998) Factoring wavelet transform into lifting steps. J Fourier Anal Appl 4(3):247\u2013269","journal-title":"J Fourier Anal Appl"},{"issue":"2","key":"331_CR23","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1006\/acha.1996.0015","volume":"3","author":"W Sweldens","year":"1996","unstructured":"Sweldens W (1996) The lifting scheme: a custom design construction of biorthogonal wavelets. Appl Comput Harmonic Anal 3(2):186\u2013200","journal-title":"Appl Comput Harmonic Anal"},{"key":"331_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-012-0369-2","author":"T Sharmila","year":"2012","unstructured":"Sharmila T, Kumar K (2012) Efficient analysis of hybrid direction lifting technique for satellite image denoising. SIViP. doi: 10.1007\/s11760-012-0369-2","journal-title":"SIViP"},{"key":"331_CR25","doi-asserted-by":"crossref","unstructured":"Fan W, Chen J, Zhen J (2005) SPIHT algorithm based on fast lifting wavelet transform in image compression. In: Hao Y et al. (ed) CIS 2005, Part II, LNAI 3802, pp 838\u2013844","DOI":"10.1007\/11596981_122"},{"issue":"8","key":"331_CR26","doi-asserted-by":"crossref","first-page":"2470","DOI":"10.1016\/j.ymssp.2009.06.003","volume":"23","author":"Y Huang","year":"2009","unstructured":"Huang Y, Liu C, Zha X, Li Y (2009) An enhanced feature extraction model using lifting based wavelet packet transform scheme and sampling-importance-resampling-analysis. Mech Syst Signal Process 23(8):2470\u20132487","journal-title":"Mech Syst Signal Process"},{"key":"331_CR27","first-page":"696","volume":"48","author":"Zhang Sq","year":"2006","unstructured":"Sq Zhang, He N, Zang HY (2006) Research of the lifting wavelet arithmetic and ang applied in rotary mechanic fault diagnosis. J Phys: Conf Ser 48:696\u2013700","journal-title":"J Phys: Conf Ser"},{"key":"331_CR28","doi-asserted-by":"crossref","unstructured":"Claypoole RL, Baraniuk RG, Nowak RD (1998) Adaptive wavelet transform via lifting. In: proceedings of IEEE international conference on acoustics speech and signal processing, pp 1513\u20131516","DOI":"10.1109\/ICASSP.1998.681737"},{"key":"331_CR29","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10462-012-9336-0","volume":"42","author":"S Ding","year":"2014","unstructured":"Ding S, Yu J, Huang B-QH (2014) An overview on twin support vector machines. Artif Intell Rev 42:245\u2013252","journal-title":"Artif Intell Rev"},{"issue":"6","key":"331_CR30","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1016\/j.sigpro.2011.12.006","volume":"92","author":"S Rawat","year":"2012","unstructured":"Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Sig Process 92(6):1480\u20131491","journal-title":"Sig Process"},{"key":"331_CR31","doi-asserted-by":"crossref","unstructured":"Wu L, Deng W, Zhang J, He D (2009) Arnold transformation algorithm and anti Arnold transformation algorithm. In: Proc. of 1st international conference on information science and engineering (ICISE) 2009, pp 1164\u20131167","DOI":"10.1109\/ICISE.2009.347"},{"issue":"1","key":"331_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2005.02.013","volume":"78","author":"R Shen","year":"2005","unstructured":"Shen R, Fu Y, Lu H (2005) A novel image watermarking scheme based on support vector regression. J Syst Softw 78(1):1\u20138","journal-title":"J Syst Softw"},{"issue":"1","key":"331_CR33","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s13042-012-0072-1","volume":"4","author":"R Khemchandani","year":"2013","unstructured":"Khemchandani R, Karpatne A, Chandra S (2013) Twin support vector regression for the simultaneous learning of a function and its derivatives. Int J Mach Learn Cybern 4(1):51\u201363. doi: 10.1007\/s13042-012-0072-1","journal-title":"Int J Mach Learn Cybern"},{"key":"331_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0200-6","author":"S Zheng","year":"2013","unstructured":"Zheng S (2013) A fast algorithm for training support vector regression via smoothed primal function minimization. Int J Mach Learn Cybern. doi: 10.1007\/s13042-013-0200-6","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"331_CR35","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s13042-011-0062-8","volume":"3","author":"KM Kundu","year":"2012","unstructured":"Kundu KM, Chowdhury M, Banarjee M (2012) Interactive image retrieval using M-band wavelet, earth mover\u2019s distance and fuzzy relevance feedback. Int J Mach Learn Cybern 3(4):285\u2013296. doi: 10.1007\/s13042-011-0062-8","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"331_CR36","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s13042-012-0099-3","volume":"4","author":"T Kathirvalvakumar","year":"2013","unstructured":"Kathirvalvakumar T, Ponmalar E (2013) Self organizing map and wavelet based image compression. Int J Mach Learn Cybern 4(4):319\u2013326","journal-title":"Int J Mach Learn Cybern"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-015-0331-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13042-015-0331-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-015-0331-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-015-0331-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T10:31:17Z","timestamp":1559471477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13042-015-0331-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,29]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1007\/s13042-015-0331-z","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,29]]}}}